搜索筛选:
搜索耗时0.2510秒,为你在为你在102,285,761篇论文里面共找到 9 篇相符的论文内容
类      型:
[期刊论文] 作者:Xue Weijia Lai Xuejia, 来源:中国通信 年份:2012
[期刊论文] 作者:Xue Weijia,Lai Xuejia, 来源:中国通信 年份:2012
[期刊论文] 作者:DUAN Ming,LAI XueJia, 来源:中国科学通报:英文版 年份:2012
Keccak 是 SHA-3 比赛周围为决赛选择的五个哈希函数之一,并且它的内部原语是称为 Keccak-f 的排列。在这份报纸,我们在 Keccak-f 为唯一的非线性的转变的逆观察那,任何产量坐标...
[期刊论文] 作者:FANG XiWen,LAI XueJia,, 来源:Science China(Information Sciences) 年份:2014
In this paper we present DNA-DBE,a DNA-chip-based dynamic broadcast encryption scheme.In our scheme,new users can join dynamically without modification of other...
[期刊论文] 作者:HUANG JiaLin,LAI XueJia,, 来源:Science China(Information Sciences) 年份:2014
Recently,several important block ciphers are considered to be broken by the brute-force-like cryptanalysis,with a time complexity faster than the exhaustive key...
[期刊论文] 作者:Wan Zhongmei,Lai Xuejia,Weng J, 来源:电子科学学刊:英文版 年份:2009
In proxy signature schemes,the proxy signer B is permitted to produce a signature on behalf of the original signer A. However,exposure of proxy signing keys can...
[期刊论文] 作者:Wan Zhongmei,Lai Xuejia,Weng J, 来源:电子科学学刊(英文版) 年份:2004
In proxy signature schemes, the proxy signer B is permitted to produce a signature on behalf of the original signer A. However, exposure of proxy signing keys c...
[期刊论文] 作者:LU MingXin,LAI XueJia,XIAO Guo, 来源:中国科学F辑(英文版) 年份:2004
DNA cryptography is a new field which has emerged with progress in the research of DNA computing. In our study, a symmetric-key cryptosystem was designed by app...
[期刊论文] 作者:ZHANG HuanGuo,HAN WenBao,LAI XueJia,LIN DongDai,MA JianFeng,LI JianHua,, 来源:Science China(Information Sciences) 年份:2015
Along with the rapid development and wide application of information technology, human society has entered the information era. In this era, people live and wor...
相关搜索: